Social rational secure multi-party computation

被引:19
|
作者
Wang, Yilei [1 ,2 ]
Liu, Zhe [3 ]
Wang, Hao [4 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[2] Ludong Univ, Sch Informat & Elect Engn, Yantai 264025, Peoples R China
[3] Univ Luxembourg, Lab Algorithm Cryptol & Secur, L-1359 Luxembourg, Luxembourg
[4] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Peoples R China
来源
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
game theory; multi-party computation; utility; Nash equilibrium; GAME-THEORY; COMMUNICATION; CRYPTOGRAPHY; COOPERATION; REPUTATION; TALK;
D O I
10.1002/cpe.3057
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Rational party is a new kind of parties who behave neither like honest parties nor like malicious adversaries. The crux point of rational party is the definition of the utility function, as rational parties only care about how to maximize their utility. In other words, rational parties choose the strategies, which can bring them the highest utilities. In rational secure two-party computation protocol, the main task is how to boost mutual cooperation to complete the protocol. Social rational secure multi-party computation (SRSMPC) means that in a social network, some distributed and rational parties with reputation properties want to jointly compute a functionality. The seemingly simple task becomes tough under three conditions. The first condition is that the network composed by parties may not be complete. That is, two parties may not be neighbors and they are connected through other parties. The second is that the network may be not secure. That is, messages may be tempered by malicious parties. The third condition is that parties may run the protocol under incomplete information scenario. That is, parties may have types and each type has a corresponding utility function. Under the first and second conditions, parties need to consider how to securely transmit messages between two parties who are not neighbors. Under the third condition, we propose the Tit-for-Tat strategy and prove that mutual cooperation is a sequential equilibrium between two parties. In this paper, we construct an SRSMPC protocol by using mechanism design under incomplete information to facilitate the implementation of the SRSMPC protocol within constant rounds. Meanwhile, newcomers are allowed to participate in the protocol. To the best of our knowledge, this is the first social rational secure computation protocol for multi-party under an incomplete information scenario and an incomplete network. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1067 / 1083
页数:17
相关论文
共 50 条
  • [1] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    [J]. QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [2] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    [J]. Quantum Information Processing, 2018, 17
  • [3] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [4] Social rational secure multi-party computation (vol 26, pg 1067, 2014)
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (09): : 2748 - 2748
  • [5] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [6] Information theory and secure multi-party computation
    Maurer, UM
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [7] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [8] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [9] Secure multi-party computation made simple
    Maurer, U
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [10] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)